Статті в журналах з теми "Monitoring Trustees"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Monitoring Trustees.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Monitoring Trustees".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Chatfield, Mary. "Monitoring the Nationʼs Financial Health: A Guide for Trustees". Health Care Management Review 12, № 4 (1987): 92. http://dx.doi.org/10.1097/00004010-198701240-00020.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Mauseth, Gary S., Jane S. Urquhart-Donnelly, and Roy R. Lewis. "Compensatory Restoration of Mangrove Habitat Following the Tampa Bay Oil Spill." International Oil Spill Conference Proceedings 2001, no. 1 (March 1, 2001): 761–67. http://dx.doi.org/10.7901/2169-3358-2001-1-761.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRACT In 1993, an incident involving three vessels near the entrance to Tampa Bay, near St. Petersburg, Florida, resulted in a discharge approximately 300,000 gallons of No. 6. fuel oil into the waters off Egmont Key. The oil contacted the shores from Egmont Key to locations approximately 14 miles to the north. Oil also entered Boca Ciega Bay through John's Pass and impacted four small islands that supported mature overwash mangrove forest. A cooperative damage assessment process was developed between the Responsible Parties (RPs) and the trustees for the natural resources: the state of Florida, the National Oceanic and Atmospheric Administration (NOAA), and the U.S. Fish and Wildlife Service (USFWS). Through the cooperative process, several alternatives for primary and compensatory restoration were developed. In considering alternatives to compensate for impacts to epibenthic communities, fish and bird habitats, wetlands, and mangrove communities, the trustees and the RPs considered purchase of shoreline habitat and restoration of mangrove forest at several sites. The RP developed a proposal to purchase and deed into public ownership in perpetuity, a 10.67-acre parcel of land on the west bank of Cross Bayou in Boca Ciega Bay that had been used as a disposal site for dredge spoil in the past. This site consisted of approximately 5.0 acres of uplands, 4.4 acres of mangrove forest, and 1.4 acres of nonmangrove intertidal and subtidal habitat. The objective of the project was to establish a typical Tampa Bay mangrove forest and a roadside buffer free of exotic plant species. The secondary goals were to establish a typical Tampa Bay salt marsh dominated by smooth cordgrass (Spartina spp.) as a successional precursor to mangrove recruitment by seeds and seedlings. Tidal exchange through the site was reestablished to improve water quality and increase export of mangrove detritus and import of high-quality tidal waters. The project was designed and constructed by the RPs with the approval and supervision of the trustees. The project was completed and title transferred to Pinellas County, Florida in summer 1999. A monitoring program was developed and performance criteria established by trustee representatives and the RPs. The monitoring program currently is being conducted and has met performance criteria to date. This project demonstrates the positive result of trustees and the RPs working together to provide compensation to the environment.
3

Lorentz, Warren P., Jerry Hall, Heather Finley, Jim Hanifen, Derek Hamilton, Linda Pace, Tony Penn, et al. "The Lake Barre Oil Spill Nrda: From Response To Restoration." International Oil Spill Conference Proceedings 2001, no. 1 (March 1, 2001): 667–70. http://dx.doi.org/10.7901/2169-3358-2001-1-667.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRACT A release of approximately 6,561 barrels of crude oil from a Texaco pipeline into Lake Barre in May 1997 injured marsh, birds, and aquatic fauna. Texaco was proactive in dealing with the trustees in the Natural Resource Damage Assessment (NRDA) process and stayed directly involved throughout; resulting in a cooperative assessment. The trustees focused quickly on the key injuries that required assessment. There was early agreement to conduct a cooperative, restoration-based NRDA, and to design field studies for the injured marsh to provide inputs for scaling using habitat equivalency analysis (HEA). It also was agreed that for this incident, field studies to assess bird and aquatic faunal injury would not be cost-effective or likely improve the accuracy of injury estimates. Although agreement on a common quantification approach for faunal injury was not reached, the two sides agreed on how much restoration was appropriate. The parties developed an extensive list of restoration alternatives, and although the trustees retained the final decision making authority, there were no significant disagreements on how various alternatives ranked according to restoration selection criteria. The selected project is planting saltmarsh vegetation on a platform of dredged material placed on East Timbalier Island by the Coastal Wetland Planning, Protection, and Restoration Act (CWPPRA) program. No CWPPRA funds were available for planting. In scaling the restoration, Texaco will only get credit for the ecological services provided by their planting above that which would occur in the absence of planting. Factors such as erosion rates expected with and without planting and the rate of natural colonization of marsh in the absence of planting were considered in the scaling calculations. The trustees and Texaco jointly briefed attorneys for both sides throughout the NRDA process, but were not active participants in meetings regarding technical matters. These briefings ensured a quick transition from the injury assessment and restoration project selection process to settlement negotiations. A consent decree was lodged with the court in September 1999. Texaco will implement the restoration and the monitoring plan, and pay all trustee assessment and restoration oversight costs as part of the settlement.
4

Craig, Leslie J., and Tom Pride. "SMALL SCALE PILOT PROJECT AS A TOOL FOR PLANNING LARGE SCALE RESTORATION." International Oil Spill Conference Proceedings 2008, no. 1 (May 1, 2008): 1163–69. http://dx.doi.org/10.7901/2169-3358-2008-1-1163.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRACT The use of pilot studies can be a useful tool in determining the most appropriate location, method and design for a large scale restoration project. This paper provides a case study where Trustees implemented a small pilot project and feasibility study to determine the best approach for a large scale oyster reef creation project. While the specific case study is the result of a CERCLA settlement (Alafia River Acid Spill of 1997), this model is transferable to other instances where Trustees are scoping for the most appropriate sites and methods to conduct settlement funded restoration. The Restoration Plan and Environmental Assessment on which the case settlement was based called for creation of approximately 4 acres of oyster reef in addition to 4 acres of estuarine marsh restoration. Through an initial scoping process, the Trustees determined that more information was needed to select the most appropriate locations and techniques to implement the large scale oyster restoration project. The Trustees identified 3 general locations with potential for larger scale oyster reef creation. A portion of settlement funding was used to contract for construction and monitoring of an oyster reef pilot project to examine the efficacy of oyster reef construction at the three locations using 4 different cultch materials. At each of the locations, 4 small reefs (approximately 75’ × 20’) were constructed and monitored for spat set, oyster survival and growth as well as subsidence. A baseline construction report and final monitoring report detailed the results. In addition, a separate report was completed that outlined the feasibility of constructing a 4 acre oyster reef in Hillsborough Bay, FL. This report included several construction considerations such as local sources and costs of cultch materials, shipping/transport, staging areas, construction equipment as well as potential local contractors. This paper reports the results of the oyster pilot project and feasibility report as well as lessons learned from each approach.
5

Kumar, Ankit. "Expertise, legitimacy and subjectivity: Three techniques for a will to govern low carbon energy projects in India." Environment and Planning C: Politics and Space 39, no. 6 (January 12, 2021): 1192–210. http://dx.doi.org/10.1177/2399654420965565.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper advances the understanding of the politics of governing energy for development projects by non-state actors. Building on Tania Murray Li’s work on trusteeship, and drawing on governmentality studies, along with ethnographic insights from two low carbon energy projects, this paper illuminates two less examined aspects of politics of energy projects. First, the designs of these projects embed particular imagined subjects, and specific techniques, to afford governance. In particular, trustees use techniques of expertise, techniques of legitimacy, and techniques of subjectivity. Second, trusteeship is a contingent phenomenon as a clear line between trustees and subjects is often missing. Many actors, simultaneously trustees and subjects, also carry socio-cultural subjectivities of class, caste and gender, which complicates the conduct of conduct. Some trustees look for benefiting people, some for profits, some to make a political career and, yet others, to support their social groups. By engaging with trusteeship, the paper flags that the governance techniques do not always benefit the ‘beneficiaries’ and are often counterproductive. The article emerges from nine-month ethnographic research done in 2012–13 in five villages in India using participant observations, interviews and group discussion, in addition to analysis of project websites and documentary materials.
6

Rodgers, Waymond, Andrés Guiral, and José A. Gonzalo. "Trusting/Distrusting Auditors’ Opinions." Sustainability 11, no. 6 (March 19, 2019): 1666. http://dx.doi.org/10.3390/su11061666.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Trust relations are essential for effective interchanges in the financial markets. Investors (trustors), as well as other market participants, can only trust financial markets if they trust their auditors (trustees). In particular, the auditors’ assessment of the client’s financial condition and its ability to continue as a going concern is paramount to improving social capital and maintaining sustainable financial markets. Research shows that a going concern opinion may have immediate consequences for both the auditing profession and financial statement users. We use the Throughput Model to illustrate how different trust positions are aligned with a particular auditor’s decision-making pathway to enhance trust, distrust or no trust from the point of view of investors’ and creditors’.
7

DE VISSCHER, CHRISTIAN, OLIVIER MAISCOCQ, and FRÉEDÉERIC VARONE. "The Lamfalussy Reform in the EU Securities Markets: Fiduciary Relationships, Policy Effectiveness and Balance of Power." Journal of Public Policy 28, no. 1 (April 2008): 19–47. http://dx.doi.org/10.1017/s0143814x08000767.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRACTIn 2000 a Committee of Wise Men chaired by Alexandre Lamfalussy, former president of the European Monetary Institute was appointed by the Economics and Finance Ministers Council to make recommendations on the regulation of the European securities markets. It proposed a four-level system to improve the legislative process while ensuring what it called a democratic and institutional balance. Our paper questions to what extent the concepts of two basic modes of delegation – agency and trust relationships – are appropriate tools to interpret the new structure set up by the Committee. It formulates hypotheses about its policy effectiveness and the balance of power between Community institutions. Evidence supports the agency hypothesis: the Lamfalussy process has reduced the average time taken to negotiate and adopt the first framework directives at level 1 and it has facilitated the removal of bottlenecks in the process through parallel working at levels 1 and 2. In this sense, delegation has enhanced policy effectiveness in the securities sector. But it is much more difficult to assess the trustee hypothesis: that is, whether the Commission and the Committee of European Securities Regulators (CESR) in fact act as trustees of the member states for the benefit of market actors. For the time being, whether CESR might evolve into a European securities regulator remains an open question.
8

Nurunnabi, Mohammad. "Political governance and (account)ability of private universities in developing countries." International Journal of Public Sector Management 29, no. 6 (August 8, 2016): 522–44. http://dx.doi.org/10.1108/ijpsm-09-2014-0112.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose Due to scarcity of research in governance and accountability in private higher education in developing countries, the purpose of this paper is to explore the tensions surrounding good governance in legitimizing accountability in private universities in developing countries with reference to Bangladesh. Design/methodology/approach Mixed methods are employed: a quantitative survey of 1,576 students from all 79 private universities; qualitative interviews with 23 stakeholders; and policy documents including the Private University Acts, the World Bank Report and newspapers (1992-2015) were evaluated. The objectives of these mixed methods in this study are juxtaposed and generate complementary insights that together create a bigger picture surrounding governance and accountability issues. Findings Using Clark's (1983) triangle model (i.e. state control, academic oligarchy, and market forces together with the external influence of donors and boards of trustees as internal governance) and new institutional theory (DiMaggio and Powell, 1983), the major contributions of this study are explaining the root causes of the poor governance of private universities through three related factors: the substantial political power and autonomy held by boards of trustees; a lack of enforcement of Private University Act; and a lack of coordination among stakeholders. The coercive power of the state becomes powerless since the board of trustees ultimately enjoys political power and “does whatever it can.” The lack of coordination of the academic oligarchy (e.g. professors and academics) and market forces (represented by students) by the board of trustees creates a paradox of governance and hence a decoupling of formal policies and actual practice. Practical implications The findings have major policy implications for local and international policymakers for improving good governance in private universities in developing countries. Originality/value The novelty of the study's findings represents an initial effort to understand the complex and persistent phenomenon of prolonged poor governance of private universities in developing countries, which is largely neglected in the literature. This will undoubtedly contribute to literature and policy implications.
9

Krucoff, Mitchell W., David M. Mortara, Katherine J. Booker, Barbara J. Drew, Robert L. Lux, Per Johanson, Mitchell W. Krucoff, et al. "The first ISCE board of [ldquo ]Trustees[rdquo ] overview panel session: Ischemia monitoring, state of the art." Journal of Electrocardiology 35, no. 4 (October 2002): 207. http://dx.doi.org/10.1054/jelc.2002.37184.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Baker, Mary, Adam Domanski, Terill Hollweg, Jason Murray, Diana Lane, Kristin Skrabis, Robert Taylor, Tom Moore, and Lisa DiPinto. "Restoration Scaling Approaches to Addressing Ecological Injury: The Habitat-Based Resource Equivalency Method." Environmental Management 65, no. 2 (January 8, 2020): 161–77. http://dx.doi.org/10.1007/s00267-019-01245-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractNatural resource trustee agencies must determine how much, and what type of environmental restoration will compensate for injuries to natural resources that result from releases of hazardous substances or oil spills. To fulfill this need, trustees, and other natural resource damage assessment (NRDA) practitioners have relied on a variety of approaches, including habitat equivalency analysis (HEA) and resource equivalency analysis (REA). The purpose of this paper is to introduce the Habitat-Based Resource Equivalency Method (HaBREM), which integrates REA’s reproducible injury metrics and population modeling with HEA’s comprehensive habitat approach to restoration. HaBREM is intended to evaluate injury and restoration using organisms that use the habitat to represent ecological habitat functions. This paper seeks to expand and refine the use of organism-based metrics (biomass-based REA), providing an opportunity to integrate sublethal injuries to multiple species, as well as the potential to include error rates for injury and restoration parameters. Applied by NRDA practitioners in the appropriate context, this methodology can establish the relationship between benefits of compensatory restoration projects and injuries to plant or animal species within an affected habitat. HaBREM may be most effective where there are appropriate data supporting the linkage between habitat and species gains (particularly regionally specific habitat information), as well as species-specific monitoring data and predictions on the growth, density, productivity (i.e., rate of generation of biomass or individuals), and age distributions of indicator species.
11

Middleton, Sue. "Equity, Equality, and Biculturalism in the Restructuring of New Zealand Schools: A Life-History Approach." Harvard Educational Review 62, no. 3 (September 1, 1992): 301–23. http://dx.doi.org/10.17763/haer.62.3.06u43p45m6t2682m.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this article, Sue Middleton draws on interview data from the initial phase of"Monitoring Today's Schools," a research project to monitor the impact of New Zealand's educational restructuring. Unlike restructuring movements in other countries,the New Zealand movement specifically included goals of social equity and cultural inclusiveness, and Middleton focuses on the reactions of parents, teachers,and administrators to the restructuring efforts surrounding these issues. After presenting a brief historical overview of the development of and debate over equity and cultural inclusiveness in New Zealand education, Middleton presents excerpts from interviews with members of three different schools' boards of trustees, which were created as part of the restructuring effort to move more authority to the local school level. She includes their reactions to the impact of social equity and cultural inclusiveness policies on their schools and their children, and concludes by describing recent developments in New Zealand education regarding these issues.
12

Watchman, Paul Q., Angela Delfino, and Andrew N. Davis. "A Flawed Prospectus?" Journal for European Environmental & Planning Law 4, no. 3 (2007): 195–212. http://dx.doi.org/10.1163/187601007x00208.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractThe purpose of this article is to assess the adequacy of disclosure requirements for environmental information. Beginning with listing rules and market disclosures, it then analyses disclosure from the viewpoint of accountancy standards, corporate governance and requirements for pension fund trustees, and finally, voluntary standards of disclosure and de facto or ad hoc disclosures occurring in different sectors of industry. It is argued that it is beyond doubt that environmental information is an important source of financial information. As such, it should be disclosed in a uniform manner and on a regular basis because of its potential impact on investment decision-making, company value and the viability and profitability of businesses. It follows that there should be an end to the uncertainty concerning the question of the "materiality" of environmental information, its disclosure and an acceptance of the need to disclose it. The failure to require specific disclosure of environmental information, and the general failure by corporations to accept the materiality of environmental information in light of other legislative developments in the field of investor protection, is viewed as a major weakness. Providing such important information to investors ought to be an obligation on listed companies. To overcome this significant weakness, specific and if possible, uniform disclosure rules for environmental information must be adopted generally.
13

Muñoz, Fernando. "How do the size and independence of the board of trustees affect the financial and sustainable performance of socially responsible mutual funds?" Corporate Social Responsibility and Environmental Management 27, no. 4 (March 13, 2020): 1834–50. http://dx.doi.org/10.1002/csr.1930.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Sand, Peter H. "Climate Law and Its Skeptics: Whither Protection of the Atmosphere?" Environmental Policy and Law 51, no. 1-2 (May 21, 2021): 5–11. http://dx.doi.org/10.3233/epl-219001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
‘Climate change law’ is considered by a number of legal scholars as an emergent novel discipline. The question, then, is whether the advent (and future prospect) of climate change has resulted in a coherent autonomous new body of law, be it a nascent one; or is it nothing more or less than the application of existing national and international environmental law to climatic problems? It is perhaps worth recalling that international environmental law itself only ascended to the rank of a recognized discipline of its own in the 1990s, over considerable academic scepticism at the time. Not un-similarly, the ongoing new project of the UN International Law Commission (ILC) for the drafting of guidelines on “protection of the atmosphere” has met with resistance from a few powerful States claiming that there is no need for further codification of international law in this field. Yet, considering our common interest in conserving the quality of the Earth’s atmosphere and climate, the ILC project may indeed encourage further development of a concept of inter-generational “planetary trusteeship”, owed by States as public trustees to present and future citizens as the beneficiaries.
15

Kuzmenko, O., T. Dotsenko, and V. Koibichuk. "DEVELOPMENT OF DATABASES STRUCTURE OF INTERNAL ECONOMIC AGENTS FINANCIAL MONITORING." Financial and credit activity: problems of theory and practice 3, no. 38 (June 30, 2021): 204–13. http://dx.doi.org/10.18371/fcaptp.v3i38.237448.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract. The article presents the results of developing the structure of databases of internal financial monitoring of economic agents in the form of a data scheme taking into account the entities, their attributes, key fields, and relationships, as well as the structure of units of regulatory information required for basic monitoring procedures based on internal and external sources. The block diagram of the financial monitoring databases, formed in the modern BPMN 2.0 notation using the Bizagi Studio software product on the basis of internal normative and reference documents, consists of tables containing information on: the client's financial monitoring questionnaire; list of risky clients according to the system of economic agent; the list of clients for which there are court rulings and financial transactions which may contain signs of risk; list of PEP clients of the economic agent; list of clients for which there is a share of state ownership (PSP); list of prohibited industries; reference books (type of financial transactions; features of financial transactions of mandatory financial monitoring; features of financial transactions of internal financial monitoring; identity document; type of subject of primary financial monitoring; type of notification; legal status of transaction participant; type of person who related to the financial transaction; the presence of permission to provide information; signs of financial transaction; regions of Ukraine); directory of risk criteria; clients with FATCA status. The scheme of the structure of databases of internal financial monitoring of economic agents using normative and reference information on the basis of external sources is presented by tables containing information on: legal entities, natural persons-entrepreneurs, public formations, public associations, notaries, lawyers of Ukraine; the list of persons related to terrorism and international sanctions, formed by the State Financial Monitoring Service of Ukraine; list of public figures and members of their families; sanctions lists (National Security and Defense Council of Ukraine; Ministry of Economic Development and Trade of Ukraine; OFAC SDN List — US sanctions list; worldwide sanctions lists; EU sanctions lists); lists of high-risk countries (aggressor state, countries with strategic shortcomings, countries with hostilities, list of the European Commission for countries with weak APC / FT regime, countries with high levels of corruption, self-proclaimed countries, countries with high risk of FT, offshore countries); The First All-Ukrainian Bureau of Credit Histories, which describes the credit history, credit risks of individuals and legal entities in Ukraine (PVBKI); International Bureau of Credit Histories, which describes the credit history of individuals and legal entities of clients of Ukrainian economic agents (MBKI); list of dual-use goods; list of persons with OSH; AntiFraud HUB — information about fraudsters; register of bankruptcies; register of debtors; register of court decisions; database of invalid documents; list of persons hiding from the authorities; register of EP payers; registers of encumbrances on movable and immovable property; data on securities; lustration register; register of arbitration trustees; corruption register; bases of Ukrainian organizations; information on foreign companies. Integrated use of the developed databases based on the proposed schemes will improve the procedures for financial monitoring by economic agents and solve several current problems. Keywords: economic agents, financial monitoring, structural scheme of the database, normative and reference information of internal securement, normative and reference information of external securement. JEL Classification E44, D53, G21, G28, G32 Formulas: 0; fig.: 2; tabl.: 0; bibl.: 12.
16

Symons, Lisa C., and James P. Delgado. "Update and Lessons Learned from RULET Assessments on Potentially Polluting Wrecks in the US." International Oil Spill Conference Proceedings 2017, no. 1 (May 1, 2017): 2017222. http://dx.doi.org/10.7901/2169-3358-2017.1.000222.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In response to a 2010 mandate from Congress, the National Oceanic and Atmospheric Administration (NOAA) produced a specifically-designed Risk Assessment for Potentially Polluting Wrecks in U.S. Waters that was then provided to the U. S. Coast Guard (USCG). A total of 87 risk assessments were presented to the USCG for inclusion into Area Contingency Plans required for all coastal, marine and Great Lakes waters in the U.S. under the Oil Pollution Act of 1990 (33 U.S. Code § 1321) in May 2013. USCG relies on NOAA for expertise in response and contingency planning and as a resource trustee for both natural resources and underwater cultural heritage. The USCG has used the RULET assessments to foster dialogue with both the potentially affected public and responders and to start thinking through general issues associated with shipwrecks that may have historical significance in additional to being potential pollution hazards. Over the past three years, several surveys of opportunity have provided an opportunity for concurrent assessments of historical and cultural significance and site-specific assessment of pollution potential. Several wrecks have been downgraded in terms of their risk, one has been remediated, one patched (FERNSTREAM, USNS MISSION SAN MIGUEL.). Surveillance and monitoring efforts have provided additional insight to specific wrecks and even helped identify wrecks that were excluded from the assessment (COIMBRA, W.E. HUTTON, USS MURPHY). Surveys have moved two wrecks across international boundaries (or rather provided new locations for TB ARGO and MV COAST TRADER.) In-water assessments have lead to unexpected pollution response challenges, such as those associated with the TB ARGO. As salvage and response technologies develop and additional surveys of opportunity take place the new information provides for continued refinement of the contingency plans and protects our environmental and economic resources along the coast. This paper will provide an evaluation and an update as to the overall effectiveness of this assessment effort to date. Activities since 2013 have significantly moved forward the understanding and engagement on the issue by responders, trustees and the public regarding potentially polluting wrecks in U.S. waters and have provided insight to other jurisdictions dealing with similar challenges.
17

Kotzé, Louis J., and Loretta Feris. "TRUSTEES FOR THE TIME BEING OF THE BIOWATCH TRUST v. REGISTRAR, GENETIC RESOURCES AND OTHERS: ACCESS TO INFORMATION, COSTS AWARDS AND THE FUTURE OF PUBLIC INTEREST ENVIRONMENTAL LITIGATION IN SOUTH AFRICA." Review of European Community & International Environmental Law 18, no. 3 (November 2009): 338–46. http://dx.doi.org/10.1111/j.1467-9388.2009.00654.x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Humby, T. "The Biowatch Case: Major Advance in South African Law of Costs and Access to Environmental Justice: Trustees for the time being of the Biowatch Trust v Registrar, Genetic Resources and others (2009) Constitutional Court of South Africa, [2009]ZACC 14." Journal of Environmental Law 22, no. 1 (January 1, 2010): 125–34. http://dx.doi.org/10.1093/jel/eqp033.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Norhikmah, Norhikmah. "Perancangan Sistem Informasi Monitoring Dosen Wali Menggunakan ASP.NET Signal R." Creative Information Technology Journal 3, no. 3 (September 23, 2016): 171. http://dx.doi.org/10.24076/citec.2016v3i3.75.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Didalam perguruan tinggi pihak akademik memiliki kewajiban untuk menunjuk seorang dosen untuk menjadi dosen wali dari beberapa mahasiswa, dosen wali diperuntukan untuk memberikan nasehat dan saran selama proses kegiatan akademik mahasiswa perwalian, selama menjadi dosen wali mengalami kendala dalam berkomunikasi dengan mahasiswa dikarenakan didalam aplikasi dosen wali yang digunakan sekarang belum ada fitur chatting untuk berkomunikasi antara dosen wali dengan mahasiswa perwalian, maka dari itu dibutuhkan sistem monitoring dosen wali dengan menggunakan ASP.net Signal R, dan perancangan sistem menggunakan UML yaitu usecase, activity diagram, dan class diagram. Hasil dari penelitian ini adalah model rancangan sistem monitoring dosen wali dengan menggunakan ASP.Net Signal R yang dapat memberikan kemudahan kepada mahasiswa dalam berkonsultasi kepada dosen, sehingga dosen dapat mengetahui rekam jejak konsultasi mahasiswa, dan permasalahan akademik yang dihadapi mahasiswa perwaliannya dengan menambahkan fitur chatting didalam aplikasi dosen wali, fitur chatting tersebut bertujuan untuk merekam jejak / monitoring/ komunikasi antara dosen wali dengan mahasiswa yang dimana rekam jejak konsultasi mahasiswa tersebut disimpan secara realtime.In college academic authorities have an obligation to appoint a lecturer to become a lecturer guardians of some students, faculty trustee intended to provide advice and suggestions during the academic activities of students guardianship, long a guardian lecturers have problems in communicating with the students because in the application lecturers guardian yet their use chat feature to communicate between faculty trustee with the students, and therefore required faculty trustee monitoring system using ASP.net Signal R, and system design using UML is use case, activity diagrams, and class diagrams. Results from this study is a model faculty trustee monitoring system design using ASP.Net Signal R to provide convenience to the student in consultation to teachers, so teachers can know the track record of consulting students, and academic problems faced by students ward by adding a chat feature inside application faculty trustee, the chat feature is intended to record trace / monitoring / communication between faculty trustee with a college student consultation where the track record is stored in realtime.
20

Al-Hail, Maryam A., Luluwah Al-Fagih, and Muammer Koç. "Partnering for Sustainability: Parent-Teacher-School (PTS) Interactions in the Qatar Education System." Sustainability 13, no. 12 (June 10, 2021): 6639. http://dx.doi.org/10.3390/su13126639.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The interaction avenues, levels, and impacts between parents, schools and teachers have changed drastically due to the ever-increasing responsibilities, frequent and rapid changes in the curriculum, the invasive dominance of the internet and digital media in the lives of all stakeholders, and the digitization of learning materials, to name a few. This pilot study follows a design-thinking approach to investigate the current practices, needs, and challenges of parental involvement in public schools in Qatar to improve student achievements towards sustainable living and habits by identifying problems, developing solutions, and improving student achievement in conjunction with all local and relevant stakeholders. To this end, building on extensive and comparative studies on theories, models, and best practices within and outside the selected domain, a qualitative study is conducted to obtain insight from local teachers and parents in preparatory public schools. The grounded theory method is employed to analyze the data via the qualitative coding technique. The results indicate that parental involvement practices in Qatar public schools occur in different forms, including home-based and school-based learning. Furthermore, while almost all parents recognize the significance of parental involvement and show a high level of interest in being on the ‘Board of Trustees’, in reality, very few participate or volunteer in school activities, and they rarely visit classrooms or interact with teachers or schools, mainly due to their increasing job-related commitments. In addition, the majority of parents indicate the need for additional flexibility in communication with the school to increase their involvement. Meanwhile, the teachers highlight the significant lack of parental involvement in understanding, overcoming and improving student achievement in both academic subjects and sustainable living habits and actions. The study outlines a few key suggestions to overcome these challenges and improve the parent-teacher-school (PTS) partnership, including offering mandatory parenting classes, developing and implementing effective communication mechanisms to facilitate parent-school interactions, and involving parents in decision-making process relating to their children and other school-related activities. Despite the sampling limitation, this study’s findings represent a starting point for understanding the needs of PTS partnerships, current practices of parental involvement, and mechanisms to improve their contribution to Qatar’s schools.
21

Shastitko, Andrey, Olga Markova, and Anna Meleshkina. "Regulatory contract usage in case of antitrust mergers and acquisitions control." St Petersburg University Journal of Economic Studies 37, no. 1 (2021): 3–33. http://dx.doi.org/10.21638/spbu05.2021.101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The article provides an analysis of counterparties’ benefits and costs within the framework of regulatory contracts the object of which is structural prescriptions issued by the antimonopoly authority controlling mergers and acquisitions. The purpose of the study is to identify discrete institutional alternatives for creating credible commitments in regulatory contracts with the participation of the monitoring trustee (taking into account the risk of distorted incentives).The object of the study is the regulatory contract between the regulator, the trustee, and the company (merger participant) in the case of divestiture, since this situation is the most sensitive in terms of setting incentives and risks of opportunism. The subject of the study is credible commitments in such regulatory contracts. The analysis is based on methods of new institutional economics and of law and economics, and it employs mathematical modeling. The comparative analysis of discrete institutional alternatives is used as the main methodological approach, and it is based on an analysis of action coordination forms and harmonization of economic agents’ expectations — in this case, the antimonopoly agency, a trustee, and companies involved in mergers and acquisitions transactions. Advantages and disadvantages of the following contracting options were identified: independent monitoring by the regulator;monitoring with the involvement of a trustee whose activities are financed by the competition authority or the company; a hybrid approach financing trustee activities; distribution of income from penalties as a way for financing trustee activities; and a system of pledges in a tripartite contract. The article also defines the conditions for credible commitments within the framework of regulatory contracts. The results of this research can be used as a guideline for institutional design in the Russian antitrust enforcement system.
22

Deo, Sunny. "Survey of senior frontline clinicians regarding the quality of information technology across the UK." British Journal of Healthcare Management 26, no. 9 (September 2, 2020): 220–26. http://dx.doi.org/10.12968/bjhc.2017.0075.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Background/Aims The quality of information technology (IT) services is key to effective healthcare delivery. However, the high aspirations of health ministers for IT services in hospitals may not be aligned with clinicians' perceptions. This study aimed to assess frontline clinicians' perceptions of the quality of IT services in their institutions. Methods The British Orthopaedics Directors Society online forum was used to invite a group of trauma and orthopaedic clinical leads from a range of hospitals to complete a short questionnaire regarding their perceptions of IT service quality in their practice. Results Negative perceptions of IT service quality were found to be common, with 45% of respondents rating their trusts' overall IT quality as poor or very poor. Of these, 13% deemed their trust's IT service quality to be so poor as to put patients at increased risk. Wide disparities were also reported between respondents' ratings of IT infrastructure quality and institutional responsiveness to concerns. Conclusions This small initial evaluation highlights concerning variations in clinicians' perceptions of IT service quality across different trusts. It also suggests the need for further, more detailed assessment and monitoring of IT quality improvement, for which the same questionnaire method may be useful.
23

Fera, M. Arun, C. manikandaprabhu, Ilakiya Natarajan, K. Brinda, and R. Darathiprincy. "Enhancing Security in Cloud Using Trusted Monitoring Framework." Procedia Computer Science 48 (2015): 198–203. http://dx.doi.org/10.1016/j.procs.2015.04.170.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Tao, Wenwei, Jinyu Wu, Zhihong Liang, and Zeming Jiang. "Trusted Security Immune Model of Power Monitoring System." Journal of Physics: Conference Series 1744, no. 2 (February 1, 2021): 022115. http://dx.doi.org/10.1088/1742-6596/1744/2/022115.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Prasad, Durga, Niranjan N. Chiplunkar, and K. Prabhakar Nayak. "A Trusted Ubiquitous Healthcare Monitoring System for Hospital Environment." International Journal of Mobile Computing and Multimedia Communications 8, no. 2 (April 2017): 14–26. http://dx.doi.org/10.4018/ijmcmc.2017040102.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Wireless Body Sensor Network with wearable and implantable body sensors have been grabbing lot of interests among the researchers and healthcare service providers. These sensors forward physiological data to the personnel at the hospital, doctor or caretaker anytime, anywhere; hence the name of the network is Ubiquitous health monitoring system. The technology has brought Internet of Things into this system making it to get connected to the cloud based internet. This has made the retrieval of information to the expert and thus improving the happiness of elderly people and patients suffering from chronic diseases. This paper focuses on creating an android based application for monitoring patients in hospital environment. The necessity of sharing hospital data to the experts around the globe has brought the necessity of trust in Health care systems. The data sharing in the IOT environment is secured. The environment is tested in real-time cloud environment. The proposed android application serves to be better architecture for hospital monitoring.
26

Wu, Jinyu, Wenwei Tao, Yuyang Lai, and Zuming Qin. "Industrial Control Trusted Computing Platform for Power Monitoring System." Journal of Physics: Conference Series 1744, no. 2 (February 1, 2021): 022114. http://dx.doi.org/10.1088/1742-6596/1744/2/022114.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Wachsman, Yoav. "Can Agents Be Trusted? Experimental Evidence From The Monitoring Game." Journal of Business & Economics Research (JBER) 9, no. 4 (April 12, 2011): 1. http://dx.doi.org/10.19030/jber.v9i4.4204.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
<p>Most principals can monitor their agents, but monitoring is usually costly and imperfect. This paper reports the experimental results of a Monitoring Game. In this sequential game, each principal decides whether to monitor an agent that he is randomly paired with and then the agent decides whether to cheat or be honest. Monitoring is costly, but it increases the probability that the agent will get caught. The experiment shows that cheating is commonplace, although most participants do not cheat if they are monitored. Additionally, cheating is more common when neutral terms are used in the instructions.<strong></strong></p>
28

Hao, Rui, Xin Guang Peng, and Lei Xiu. "Research on Software Trusted Dynamic Measurement." Applied Mechanics and Materials 268-270 (December 2012): 1869–72. http://dx.doi.org/10.4028/www.scientific.net/amm.268-270.1869.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
For the problem of trust chain of Trusted Computing Group (TCG), which only measures static integrity to the system resources, we extend the TCG chain to the software application layer and propose to extract return addresses of functions in call stacks dynamically for obtaining system call short sequences as software behavior and By monitoring softare behavior based on SVM,we realize software trusted dynamic measurement.
29

Jones-Berry, Stephanie. "NHS should consider nurse-led medicine monitoring at trusts." Mental Health Practice 20, no. 4 (December 9, 2016): 6. http://dx.doi.org/10.7748/mhp.20.4.6.s2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Zhang, Xiaodong, Matthew Clark, Kudip Rattan, Jonathan Muse, and Mohsen Khalili. "Controller Integrity Monitoring in Adaptive Learning Systems Towards Trusted Autonomy." IEEE Transactions on Automation Science and Engineering 13, no. 2 (April 2016): 491–501. http://dx.doi.org/10.1109/tase.2016.2535462.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Kiser, Angelina I. T., Timothy Porter, and David Vequist. "Employee Monitoring and Ethics." International Journal of Digital Literacy and Digital Competence 1, no. 4 (October 2010): 30–45. http://dx.doi.org/10.4018/jdldc.2010100104.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
More advanced technologies that make it possible to monitor employees in the workplace have led to controversies on both legal and ethical grounds. Employers can now easily monitor emails, Internet usage and sites visited, and keystrokes, as well as use GPS systems to track employees’ movements throughout the day. At one end of the spectrum is the employer who claims that monitoring not only improves productivity but is a legal necessity that assists in keeping the company from becoming legally liable for employees’ misuse of technology. Employees, on the other hand, want their privacy protected, and many believe that it is more a matter of them not being trusted. In this paper, an examination is presented that describes various forms of workplace surveillance and monitoring, viewpoints of both employers and employees, policies that companies have implemented, and the ethical and legal implications of such policies.
32

Ali, Muhammad Salek, Massimo Vecchio, Guntur D. Putra, Salil S. Kanhere, and Fabio Antonelli. "A Decentralized Peer-to-Peer Remote Health Monitoring System." Sensors 20, no. 6 (March 16, 2020): 1656. http://dx.doi.org/10.3390/s20061656.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Within the Internet of Things (IoT) and blockchain research, there is a growing interest in decentralizing health monitoring systems, to provide improved privacy to patients, without relying on trusted third parties for handling patients’ sensitive health data. With public blockchain deployments being severely limited in their scalability, and inherently having latency in transaction processing, there is room for researching and developing new techniques to leverage the security features of blockchains within healthcare applications. This paper presents a solution for patients to share their biomedical data with their doctors without their data being handled by trusted third party entities. The solution is built on the Ethereum blockchain as a medium for negotiating and record-keeping, along with Tor for delivering data from patients to doctors. To highlight the applicability of the solution in various health monitoring scenarios, we have considered three use-cases, namely cardiac monitoring, sleep apnoea testing, and EEG following epileptic seizures. Following the discussion about the use cases, the paper outlines a security analysis performed on the proposed solution, based on multiple attack scenarios. Finally, the paper presents and discusses a performance evaluation in terms of data delivery time in comparison to existing centralized and decentralized solutions.
33

Aditya, Teresa, Anjali Pal, and Tarasankar Pal. "Nitroarene reduction: a trusted model reaction to test nanoparticle catalysts." Chemical Communications 51, no. 46 (2015): 9410–31. http://dx.doi.org/10.1039/c5cc01131k.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Barka, Ezedin, Sofiane Dahmane, Chaker Abdelaziz Kerrache, Mohamad Khayat, and Farag Sallabi. "STHM: A Secured and Trusted Healthcare Monitoring Architecture Using SDN and Blockchain." Electronics 10, no. 15 (July 26, 2021): 1787. http://dx.doi.org/10.3390/electronics10151787.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Healthcare professionals and scholars have emphasized the need for IoT-based remote health monitoring services to track the health of the elderly. Such systems produce a large amount of data, necessitating the security and privacy of that data. On the other hand, Software Defined Networking (SDN) integration could be seen as a good solution to guarantee both flexibility and efficiency of the network which is even more important in the case of healthcare monitoring. Furthermore, Blockchain has recently been proposed as a game-changing tool that can be integrated into the Internet of Things (IoT) to have the optimal level of security and privacy. However, incorporating Blockchain into IoT networks, which rely heavily on patients’ health sensors, is extremely difficult. In this paper, a secure Healthcare Monitoring System (HMS) is proposed with a focus on trust management issues. The architecture seeks to protect multiple healthcare monitoring system components and preserves patient privacy by developing a security interface where separate security modules can be integrated to run side by side to ensure reliable HMS. The security framework architecture we propose takes advantage of the blockchain technology as a secure and timely information back-end. STHM is a proposal that uses Software-Defined Networking (SDN) as the communication medium that allows users to access SDN’s different functional and security technologies and services. Simulation results show that the use of Blockchain for the SDN-based healthcare monitoring can ensure the desired flexibility and security for a very lightweight additional overhead.
35

Gomez, Laurent, and Michel Riveill. "Trusted Integration of Wireless Sensor Networks into Herd Control Monitoring Application." International Journal of Agricultural and Environmental Information Systems 4, no. 4 (October 2013): 1–24. http://dx.doi.org/10.4018/ijaeis.2013100101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Integration of trusted information is an important requirement from business application. As business applications adaption relies on sensor data, that information must be trustworthy enough in order to prevent any misuse of sensor data. For example, the use of un-trustworthy information in healthcare system can have severe consequence on patient life. But it appears that sensors are not tamper resistant enough in order to prevent any capture of cryptographic material stored on the nodes. Therefore, a soft security alternative of hardening security mechanisms is to ensure trustworthiness of sensor data. From its production on the node to its delivery to the business application, and including its processing and forwarding, the authors propose to assess sensor data along its life-cycle. In this paper, the authors propose a framework for the assessment of sensor data trustworthiness, from the acquisition at the node to their delivery to business applications, including any intermediary routing or processing. The assessment aims at identifying erroneous sensor data caused intentionally or unintentionally. In addition, the authors evaluate their approach with real sensor data acquired in the scope of the WASP project (http://www.wasp-project.org - Wirelessly Accessible Sensor Populations - IST 034963) during a herd control experiment.
36

Nguyen, Lam D., Anders E. Kalor, Israel Leyva-Mayorga, and Petar Popovski. "Trusted Wireless Monitoring Based on Distributed Ledgers over NB-IoT Connectivity." IEEE Communications Magazine 58, no. 6 (June 2020): 77–83. http://dx.doi.org/10.1109/mcom.001.2000116.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Zou, Deqing, Wenrong Zhang, Weizhong Qiang, Guofu Xiang, Laurence Tianruo Yang, Hai Jin, and Kan Hu. "Design and implementation of a trusted monitoring framework for cloud platforms." Future Generation Computer Systems 29, no. 8 (October 2013): 2092–102. http://dx.doi.org/10.1016/j.future.2012.12.020.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Kaufman, L. D. "Intergenerational Trusts and Environmental Protection." Journal of Environmental Law 14, no. 3 (March 1, 2002): 421–22. http://dx.doi.org/10.1093/jel/14.3.421.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

WEN, Jing, Huai-Min WANG, Shi YING, You-Cong NI, and Tao WANG. "Toward a Software Architectural Design Approach for Trusted Software Based on Monitoring." Chinese Journal of Computers 33, no. 12 (May 23, 2011): 2321–34. http://dx.doi.org/10.3724/sp.j.1016.2010.02321.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Shanmugam, Udhayakumar, and Latha Tamilselvan. "Dynamic Resource Monitoring of SaaS with Attestation for a Trusted Cloud Environment." International Journal of Security and Its Applications 10, no. 4 (April 30, 2016): 41–50. http://dx.doi.org/10.14257/ijsia.2016.10.4.05.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Shevchenko, Anton, Mark Pagell, Moren Lévesque, and David Johnston. "Preventing supplier non-conformance: extending the agency theory perspective." International Journal of Operations & Production Management 40, no. 3 (March 2, 2020): 315–40. http://dx.doi.org/10.1108/ijopm-08-2019-0601.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
PurposeThe supply chain management literature and agency theory suggest that preventing supplier non-conformance—a supplier's failure to conform to the requirements of the buyer—requires monitoring supplier behavior. However, case studies collected to explore how buyers monitored suppliers revealed an unexpected empirical phenomenon. Some buyers believed they could prevent non-conformance by either trusting their suppliers or relying on a third party, without monitoring their behavior. The purpose of this article is to examine conditions when buyers should monitor supplier behavior to prevent non-conformance.Design/methodology/approachThis article employs a mixed-method design by formulating an agent-based simulation grounded in the case-study findings and agency theory to reconcile observed unexpected behaviors with scholarly suggestions.FindingsThe simulation results indicate that buyers facing severe consequences from non-conformance should opt to monitor supplier behavior. Sourcing from trusted suppliers should only be reserved for buyers that lack competence and have a small number of carefully selected suppliers. Moreover, buyers facing minor consequences from non-conformance should generally favor sourcing from trusted suppliers over monitoring their behavior. The results also suggest that having a third-party involved in monitoring suppliers is an effective path to preventing non-conformance.Originality/valueBy combining a simulation with qualitative case studies, this article examines whether buyers were making appropriate decisions, thereby offering contributions to theory and practice that would not have been possible using either methodological approach alone.
42

Muhamad Don, Mohd Ali, and Muhamad Rahimi Osman. "The Management of Waqf Universities in Selangor, Malaysia." Journal of Contemporary Islamic Studies 6, no. 1 (September 14, 2020): 45–60. http://dx.doi.org/10.24191/jcis.v6i1.3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In Malaysia, waqf management including those in universities, is under the authority of the State Islamic Religious Council as a sole trustee waqf. This is to protect the waqf assets from any interventions by the heirs. Even so, one Malaysian university is said to manage the waqf scheme without the supervision of the Islamic Council which contradict with the provision of the State of Islamic Religious Council (SIRC) as the sole trustee of waqf. Thus, this study explores the management of waqf by several universities in Selangor and relation to SIRC as the sole trustee of waqf. A qualitative research approach was employed to collect data from focus group discussions and interviews with selected participants from the Selangor Islamic Religious Council (Selangor IRC), selected universities and waqf experts in Malaysia. The findings show that University Kebangsaan Malaysia and University Putra Malaysia waqf funds are managed under the Selangor IRC monitoring while University Islam Antarabangsa Malaysia endowment or waqf fund is managed privately by the university. The impact of this is that several waqf management issues arose. Hence, the authors recommend the Model theory of al-wilayah to be applied in the management of waqf in the universities. Through this model, SIRC and the university can play a more significant role in the management of waqf, thereby promoting the development of waqf in Malaysia.
43

Gonzalez, Laura. "Blockchain, herding and trust in peer-to-peer lending." Managerial Finance 46, no. 6 (May 13, 2019): 815–31. http://dx.doi.org/10.1108/mf-09-2018-0423.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose The gradual implementation of blockchain technology in peer-to-peer (P2P) lending platforms facilitates safer, transparent and quick access to funds without having to deal with the more complex and costly processes of banks. Beyond that, the purpose of this paper is to examine trust-enhancing heuristics that show a need for blockchain to assist in monitoring and bad loan recovery. Design/methodology/approach This study examines 909 lending decisions by 303 finance students on a mock P2P site. Each participant was asked to make three lending decisions. The loan applications were identical with the exception of a female or male photo (vs an icon) and reports of having raised half the loan in either 2 or 11 days (vs 7). Findings Investors who have experienced financial trauma are more likely to herd and lend higher amounts to loan applicants that are highly trusted by other lenders. This effect is more pronounced for male investors lending to highly trusted female loan applicants. Practical implications Blockchain can compensate for behavioral biases and improve monitoring by helping track digital money transactions and assisting in bad loan recovery efforts. Originality/value This study is the first behavioral experiment to examine herding in P2P lending. The findings complement and corroborate those by Gonzalez and Komarova (2014, 2015) and emphasize the need for blockchain to assist beyond trusted records and safe transfers of funds.
44

Parker, Dominic P., and Walter N. Thurman. "Private Land Conservation and Public Policy: Land Trusts, Land Owners, and Conservation Easements." Annual Review of Resource Economics 11, no. 1 (October 5, 2019): 337–54. http://dx.doi.org/10.1146/annurev-resource-100518-094121.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
We highlight the extraordinary growth in private conservation via land trusts and conservation easements and describe the problems arising from the interplay of public finance and private decisions. We offer a framework for understanding the popularity of easements and land trusts and for evaluating policy reforms aimed at improving their performance. The framework, grounded in institutional and organizational economics in the tradition of Ronald Coase, Oliver Williamson, and Yoram Barzel, focuses on the measurement and monitoring costs faced by public and private stakeholders under current and prospective policy arrangements. We illustrate how the framework can be applied to contemporary debates about the appropriate tax treatment of donated easements, requirements that they be held in perpetuity, and the extent to which government should regulate private land trusts.
45

Fournaris, Apostolos P., Charis Dimopoulos, Konstantinos Lampropoulos, and Odysseas Koufopavlou. "Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices." Sensors 20, no. 11 (May 30, 2020): 3092. http://dx.doi.org/10.3390/s20113092.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Critical infrastructures and associated real time Informational systems need some security protection mechanisms that will be able to detect and respond to possible attacks. For this reason, Anomaly Detection Systems (ADS), as part of a Security Information and Event Management (SIEM) system, are needed for constantly monitoring and identifying potential threats inside an Information Technology (IT) system. Typically, ADS collect information from various sources within a CI system using security sensors or agents and correlate that information so as to identify anomaly events. Such sensors though in a CI setting (factories, power plants, remote locations) may be placed in open areas and left unattended, thus becoming targets themselves of security attacks. They can be tampering and malicious manipulated so that they provide false data that may lead an ADS or SIEM system to falsely comprehend the CI current security status. In this paper, we describe existing approaches on security monitoring in critical infrastructures and focus on how to collect security sensor–agent information in a secure and trusted way. We then introduce the concept of hardware assisted security sensor information collection that improves the level of trust (by hardware means) and also increases the responsiveness of the sensor. Thus, we propose a Hardware Security Token (HST) that when connected to a CI host, it acts as a secure anchor for security agent information collection. We describe the HST functionality, its association with a host device, its expected role and its log monitoring mechanism. We also provide information on how security can be established between the host device and the HST. Then, we introduce and describe the necessary host components that need to be established in order to guarantee a high security level and correct HST functionality. We also provide a realization–implementation of the HST overall concept in a FPGA SoC evaluation board and describe how the HST implementation can be controlled. In addition, in the paper, two case studies where the HST has been used in practice and its functionality have been validated (one case study on a real critical infrastructure test site and another where a critical industrial infrastructure was emulated in our lab) are described. Finally, results taken from these two case studies are presented, showing actual measurements for the in-field HST usage.
46

Ogdie, A., A. Gustafson, A. Lieberman, J. Mason, A. Armstrong, N. Mehta, R. Beidas, and J. Gelfand. "POS1063 RHEUMATOLOGIST AND PATIENT PERSPECTIVES ON IMPLEMENTING CARDIOVASCULAR RISK PREVENTION IN THE MANAGEMENT OF PSORIASIS: A QUALITATIVE STUDY." Annals of the Rheumatic Diseases 80, Suppl 1 (May 19, 2021): 810.2–810. http://dx.doi.org/10.1136/annrheumdis-2021-eular.902.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Background:Psoriatic arthritis (PsA) is an immune-mediated musculoskeletal disease associated with excess risk for cardiovascular disease (CVD). New US-based guidelines recognize psoriasis as a CVD risk enhancer; however, patients with PsA often do not have CVD risk factors identified nor managed.Objectives:This study examines strategies to improve CVD prevention care from the perspective of rheumatologists and patients with PsA.Methods:Semi-structured qualitative interviews were conducted using an interview guide based on the Consolidated Framework for Implementation Research to examine the perspectives of rheumatologists (N = 8) and patients with psoriatic arthritis managed by rheumatologists (N = 8) on barriers/facilitators to CVD prevention. Interviews were transcribed and coded using an integrated approach designed to enhance reliability and validity facilitated by NVivo software.Results:Most rheumatologists confirmed that they were not regularly engaging in CVD prevention care with psoriatic arthritis patients. Providers reported sometimes counseling and screening for CVD risk, but they were not regularly prescribing statins and not as willing to do so. Reasons included a lack of familiarity or comfort with guidelines, concern about working outside of their scope of practice, confusing boundaries between other clinicians, and time constraints. Most patients confirmed that it was uncommon for their rheumatologists to engage them in CVD prevention care but expressed desire for their rheumatologists inform them of the risk, and were open to CVD prevention care from them.Conclusion:We identified several potentially modifiable barriers to CVD screening and management. These findings will inform the design of a clinical trial comparing the effectiveness of rheumatologist implementation of CVD guideline-based counseling, screening and prescribing statins when appropriate in patients with PsA.Figure 1.Barriers to CVD screening and management among patients with PsA in a rheumatology practice setting and potential strategies to address those barriers. Abbreviations: CV = cardiovascular; SOC = standard of care.Disclosure of Interests:Alexis Ogdie Consultant of: Abbvie, Amgen, BMS, Celgene, Corrona, Gilead, Janssen, Lilly, Novartis, Pfizer, UCB, Grant/research support from: Pfizer to Penn, Novartis to Penn, Amgen to Forward/NDB, Alix Gustafson: None declared, Adina Lieberman: None declared, Jennifer Mason: None declared, April Armstrong: None declared, Nehal Mehta Consultant of: Amgen, Eli Lilly, and Leo Pharma receiving grants/other payments, Grant/research support from: AbbVie, Celgene, Janssen Pharmaceuticals, Inc, and Novartis receiving grants and/or research funding and as a principal investigator for the National Institute of Health receiving grants and/or research funding., Employee of: NNM is a full-time US government employee, Rinad Beidas Consultant of: Camden Coalition of Healthcare Providers in the past 3 years. She currently is a consultant for United Behavioral Health. She serves on the Optum Behavioral Health Clinical and Scientific Advisory Council. Dr. Beidas receives royalties from Oxford University Press., Joel Gelfand Shareholder of: Dr Gelfand is a co-patent holder of resiquimod for treatment of cutaneous T-cell lymphoma, and he is a deputy editor for the Journal of Investigative Dermatology, receiving honoraria from the Society for Investigative Dermatology., Paid instructor for: CME work related to psoriasis that was supported indirectly by Eli Lilly and Company and Ortho Dermatologics, Consultant of: Bristol-Myers Squibb, Boehringer Ingelheim, GlaxoSmithKline, Janssen Biologics, Novartis Corp, UCB (Data Safety and Monitoring Board), Sanofi, and Pfizer Inc, Grant/research support from: research grants (to the Trustees of the University of Pennsylvania) from AbbVie, Janssen, Novartis Corp, Celgene, OrthoDermatologics, and Pfizer Inc.
47

Hickey, S. A., D. B. Mitchell, J. G. Buckley, A. F. Fitzgerald O'Connor, and J. L. Wunderlich. "Electrocochleography: a new technique." Journal of Laryngology & Otology 104, no. 4 (April 1990): 326–27. http://dx.doi.org/10.1017/s0022215100112605.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractThe near field monitoring of an auditory evoked response from the cochlear (electrocochleography) is a tried and trusted clinical tool. Conventional techniques for performing electrocochleography are cumbersome to use and frequently uncomfortable for the patient. We present a simple, modified technique which provides more flexibility with regard to where and when electrocochleography may be performed and also improves patient comfort during the test.
48

Nisa, Khairunnisa. "CHARACTER EDUCATION MANAGEMENT OF STUDENTS IN Dormitory MADRASAH ALIYAH (MAN)GORONTALO." Jurnal Pendidikan Kewarganegaraan 5, no. 2 (September 30, 2018): 107. http://dx.doi.org/10.32493/jpkn.v5i2.y2018.p107-116.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The basic thinking of this research is finding the character values inculcated in the building of boarding students in MAN Insan Cendikia, learning process of character building for boarding students in MAN Insan Cendikia Gorontal, and monitoring and evaluation of the management of boarding students character building at MAN Insan Cendikia Gorontalo. The method used in this study is a qualitative method with a case study approach. Data sources from Principals, Dormitories coordinators, Academic Heads, Trustess of Class XII Science, Class X Students, English Language Teachers, Sports Section Coordinators, Science Section Coordinators, Head of Student Affairs and Quality Assurance Section Heads. Data is colleted through observasion, interviews, and document study.
49

Maarouf, Adil, Youssef Mifrah, Abderrahim Marzouk, and Abdelkrim Haqiq. "An Autonomic SLA Monitoring Framework Managed by Trusted Third Party in the Cloud Computing." International Journal of Cloud Applications and Computing 8, no. 2 (April 2018): 66–95. http://dx.doi.org/10.4018/ijcac.2018040104.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This article describes how currently, service level agreements (SLAs) assurance forms one of the major challenges for cloud computing (CC) in order to guarantee quality of service (QoS) in real-time and control SLA violations. However, due to the highly dynamic nature of this open environment, it is important to have a binding agreement between all the service parties for ensuring trust while fulfilling the expected QoS. To properly operate and manage such complex situations, an effective and efficient monitoring is crucial. The participation of a trusted third party (TTP) is necessary in order to resolve conflicts between involved parties. This article proposes an autonomic SLA monitoring framework managed by TTP composed of two modules: the first one SLA establishment module, which aims at providing support for automated SLA generation and management. The second one, a service monitoring module to dynamically monitor QoS metrics by detecting SLA violations at runtime to verify compliances for the respective SLAs, and to propose a mechanism for an adaptive remedy rectification, as a contribution at the third maturity level of the autonomic computing paradigm as defined by IBM. The framework is validated with scenarios on response time and availability, the results obtained are promising. They confirm that this framework manages SLAs in an efficient way as it detects all violations to be communicated to concerned parties, and identifies particular penalty clauses that can be used to modify the reputation of a provider over time. The TTP framework equipped with such reputation module can provide real-time assessment for consumers informed decision making to continue using a service or to migrate to another service provider in the case of service degradation. This creates a fair competitiveness between providers and hence improves service performance and the reliability in the cloud.
50

Patterson, Lesley, Paul Jarvis, Arpana Verma, Roger Harrison, and Iain Buchan. "Measuring children and monitoring obesity: surveys of English Primary Care Trusts 2004–06." Journal of Public Health 28, no. 4 (October 30, 2006): 330–36. http://dx.doi.org/10.1093/pubmed/fdl070.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії